Great now run it in a disposable vape!
Great now run it in a disposable vape!
Lol so basically just horned mecha Godzilla ?
Munching ass, no genitals involved. There are more examples, hopefully you can use your imagination so we don’t have to list them. A web search might also prove fruitful .
Literally eating ass for 14 years, never got an itchy butt. If someone has them, they would know and maybe not even want to have genital sex. The best sex happens with people you can trust.
Your post history is zero. Get some JFK in your life: “but what you can do for your country”
Just like govt issued currency
Spiderheck, should be cheap!
It’s not the legal name, it’s whatever you want it to be, or your name with a salt. There is no requirement for the “user” and “site” fields to be: your name or your webpages name, you just need to remember your pattern. Your User could be a complex password too . Your sites could have another complex password preceding them. Your website format could even be preceded by another generative password. eg getting my lemmy creds would look like: pwd sup3rs3cure%, user w0ntc4tchm3^ , website: Naqm3~KinoZiju.lemmy , not my actual email, or my display username here, nor the actual plain url of the website . Good luck getting any other website password if “sup3rs3cure%” is leaked, which is hardly possible as it is never uploaded anywhere .
It says about spectre:
With these 2 password managers, if I know your master password, all I need to do is to find your username/email address(which is trivia cuz usernames are public and email addresses are not confidential), and I can derive every single password you have and completely mess you up
But you clearly must not use your email as your “user”, and you can also salt your “website” too, eg:
I am James Wililiams, email: jimmyw@gmail.com, I want a password for lemmy.world, if your spectre usage is: user: jimmyw@gmail.com, masterpassword: mydogsname99, site: lemmy.world, your masterpassword leakage might be dangerous. But if you generate your passwords in the form of: user James MyMagicSalt Williams
, password: ASuperCrazyMasterP455w0rdW1th1337
, and website: anotherOfMySalts.lemmy.world, there is nothing wrong with someone getting your master password, good luck getting any real passwords from it. You would need to straight up be keylogged and be inputting the 3 settings while somebody knowing you are doing it in order to make sense of the keylog.
Once you master password gets leaked, attackers would also need to know:
Stopped reading at “storing my passwords on a db”. Even if you encrypt the data, is it not just plain better to use a generative algorithm for passwords instead that needs no cloud? Why would you even introduce the vulnerability yourself of storing passwords somewhere in the first place? Keep it simple, you don’t want to over-engineer yourself to death, especially if you are actually downgrading your security by building too far ahead of what you actually need.
I suggest you watch Berserk.
Not the best cat toy, get him something he can catch!